IoTruth: Traditional security approach using agents will work fine in the world of IoT

Today’s IoTruth is: Traditional security approach using agents will work fine in the world of IoT

Well, let’s start talking about agents. Agents are a little piece of software that companies typically put on your computer to protect your device. If you look on your computer, you’ll likely see a logo of one of the big vendors in the space. They’re able to use software to secure your device: to be able to see it and to fully manage it.

It works just perfectly for these types of these devices because, frankly, there’s only a few operating systems in the world. You have Windows, Apple, and even your cell phones are all Android or iPhone for the most part. The problem with the Internet of Things (IoT) is there’s a huge proliferation of devices. Let’s take a look:

Here’s this big bad boy [pats printer]. To start, it’s a great printer. This actually has a computer in it and quite a bit of computing power. But let’s figure out: Where would I put an agent in here? Where’s the keyboard? Where would I actually install anything in this machine? And let’s assume I actually could do that, was able to install it. What happens on the other vendors of printers in my environment? They’re all going to be different operating systems. And, that’s just the printers.

Now imagine all the IoT devices you have in your organization. And how many different types of agents you would need. Most of these devices actually do not allow you to install the agents. So you have a problem of proliferation of devices and OSs that are closed, and you have a problem of scale. You simply can’t manage this because the number of devices are so broad and so different from each other.

So the IoTruth for today? The traditional agent security approach does not work for IoT. You need to take an agentless approach. You need to use that approach to get full visibility of all your devices and be able to control and secure these devices so you can access them properly.

Featured Posts

Twitter: @smtaylor12 I was recently fortunate enough to participate in a joint webinar with the CISO for the District of Columbia, John MacMichael and the CISO for the City of New York, Geoff Brown. We had close to 100 attendees and the hour-long session spanned topics like: Smart city projects currently underway Constituent-consumed services (such […]

Twitter: @KzmoKramr2 Visibility is foundational to cybersecurity. After all, you can’t secure what you can’t see. Therefore, it’s understandable that, these days, many cybersecurity companies claim to provide “visibility.” A problem for those shopping for cyber tools is that many “cyber solutions” can sound the same. How are you supposed to truly distinguish what’s what […]

Twitter: @GoGeisler With the rapid influx and diversity of devices connecting to enterprise networks and the ever-evolving cybersecurity threat landscape, organizations are struggling to keep their physical and virtual environments secure while embracing IoT and operational technology (OT). To help organizations tackle these challenges, ForeScout CounterACT® now features new advancements, including out-of-the- box device classification […]